IOC Report
AdvancedReclaiMeFreeRAIDRecoveryFreeSetup.msi

loading gif

Files

File Path
Type
Category
Malicious
AdvancedReclaiMeFreeRAIDRecoveryFreeSetup.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Advanced ReclaiMe Free RAID Recovery Free, Author: www.reclaime.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install Advanced ReclaiMe Free RAID Recovery Free., Template: Intel;1033, Revision Number: {BAAEC4FF-367D-45A2-B266-709F9930739C}, Create Time/Date: Fri Apr 12 15:52:02 2024, Last Saved Time/Date: Fri Apr 12 15:52:02 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libmodel.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libssl-1_1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libxml2-2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\msvcp140_atomic_wait.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\msvcp140_codecvt_ids.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\ucrtbase.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\zlib1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Config.Msi\4c320b.rbs
data
modified
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\ActivityTracesHelper.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\Plugin.db
data
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\Renders\Memo.db
data
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\Videos\Plan.wav
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, mono 44100 Hz
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\concrt140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\groceryc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\iconv.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libBasic.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libHelper.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libI18n.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libRG.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libUpdate.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libView.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libcrypto-1_1.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libcurl.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libexpat.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\libglog.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\msvcp140_1.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\msvcp140_2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\pthreadGC2.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\vccorlib140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Aeeqeayhuhpyr
data
dropped
C:\Users\user\AppData\Local\Temp\Aefqsrpyphpud
data
dropped
C:\Users\user\AppData\Local\Temp\Artdtudiueptp
data
dropped
C:\Users\user\AppData\Local\Temp\Doeiyeudsesf
data
dropped
C:\Users\user\AppData\Local\Temp\Doiiqeoyhiuu
data
dropped
C:\Users\user\AppData\Local\Temp\Dssoudhfrqfe
data
dropped
C:\Users\user\AppData\Local\Temp\Dssoudhfrqfe-shm
data
dropped
C:\Users\user\AppData\Local\Temp\Eaoettiaawqfaro
data
dropped
C:\Users\user\AppData\Local\Temp\Eaoowssy
data
dropped
C:\Users\user\AppData\Local\Temp\Eepeeoaw
data
dropped
C:\Users\user\AppData\Local\Temp\Efwfaqqq
data
dropped
C:\Users\user\AppData\Local\Temp\Epahsoup
data
dropped
C:\Users\user\AppData\Local\Temp\Fdreht
data
dropped
C:\Users\user\AppData\Local\Temp\Ferepq
data
dropped
C:\Users\user\AppData\Local\Temp\Fetsqh
data
dropped
C:\Users\user\AppData\Local\Temp\Fsuotd
data
dropped
C:\Users\user\AppData\Local\Temp\Htufwph
data
dropped
C:\Users\user\AppData\Local\Temp\Idafdrpasdi
data
dropped
C:\Users\user\AppData\Local\Temp\Ioftfpppefy
data
dropped
C:\Users\user\AppData\Local\Temp\Ipfpeoitpay
data
dropped
C:\Users\user\AppData\Local\Temp\Itysuyushiq
data
dropped
C:\Users\user\AppData\Local\Temp\Iuespohtose
data
dropped
C:\Users\user\AppData\Local\Temp\Oddqspsputwp
data
dropped
C:\Users\user\AppData\Local\Temp\Oeuweeteyhpp
data
dropped
C:\Users\user\AppData\Local\Temp\Ofyyutieeqhs
data
dropped
C:\Users\user\AppData\Local\Temp\Ofyyutieeqhs-shm
data
dropped
C:\Users\user\AppData\Local\Temp\Owaeedapdrhy
data
dropped
C:\Users\user\AppData\Local\Temp\Owrepqosrwuq
data
dropped
C:\Users\user\AppData\Local\Temp\Perhepso
data
dropped
C:\Users\user\AppData\Local\Temp\Piouuyiqowo
data
dropped
C:\Users\user\AppData\Local\Temp\Piwqqeeeyaf
data
dropped
C:\Users\user\AppData\Local\Temp\Qhyeraedroyyyt
data
dropped
C:\Users\user\AppData\Local\Temp\Qowroeesfyoyre
data
dropped
C:\Users\user\AppData\Local\Temp\Qqewptfsehtudy
data
dropped
C:\Users\user\AppData\Local\Temp\Qraquyostiuews
data
dropped
C:\Users\user\AppData\Local\Temp\Qraquyostiuews-shm
data
dropped
C:\Users\user\AppData\Local\Temp\Qwewfifwqueesh
data
dropped
C:\Users\user\AppData\Local\Temp\Raafyiaastoyq
data
dropped
C:\Users\user\AppData\Local\Temp\Rauusweeoeqar
data
dropped
C:\Users\user\AppData\Local\Temp\Rduuodeqso
data
dropped
C:\Users\user\AppData\Local\Temp\Rduuodeqso-shm
data
dropped
C:\Users\user\AppData\Local\Temp\Rudoehrsup
data
dropped
C:\Users\user\AppData\Local\Temp\Satetseaaoods
data
dropped
C:\Users\user\AppData\Local\Temp\Sieirefowet
data
dropped
C:\Users\user\AppData\Local\Temp\Spftre
data
dropped
C:\Users\user\AppData\Local\Temp\Tquoifhieitawo
data
dropped
C:\Users\user\AppData\Local\Temp\Trsquwsdretrdu
data
dropped
C:\Users\user\AppData\Local\Temp\Wftdsr
data
dropped
C:\Users\user\AppData\Local\Temp\Wpefhtaetdehqhy
data
dropped
C:\Users\user\AppData\Local\Temp\Wtsrweoehtqydaq
data
dropped
C:\Users\user\AppData\Local\Temp\Wwayepwofduqu
data
dropped
C:\Users\user\AppData\Local\Temp\Wyudphfye
data
dropped
C:\Users\user\AppData\Local\Temp\Yawqyuaqr
data
dropped
C:\Users\user\AppData\Local\Temp\Yawqyuaqr-shm
data
dropped
C:\Users\user\AppData\Local\Temp\Ydtusdaft
data
dropped
C:\Users\user\AppData\Local\Temp\Yrrssudta
data
dropped
C:\Users\user\AppData\Local\Temp\Yrsistyhe
data
dropped
C:\Users\user\AppData\Local\Temp\Yrsistyhe-shm
data
dropped
C:\Users\user\AppData\Local\Temp\Ytotaeupt
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3gqlqhaz.0jj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b5zjc2el.05m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e5vyqyhw.chs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ozgpe0sh.uam.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Installer\4c320a.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Advanced ReclaiMe Free RAID Recovery Free, Author: www.reclaime.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install Advanced ReclaiMe Free RAID Recovery Free., Template: Intel;1033, Revision Number: {BAAEC4FF-367D-45A2-B266-709F9930739C}, Create Time/Date: Fri Apr 12 15:52:02 2024, Last Saved Time/Date: Fri Apr 12 15:52:02 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\4c320c.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Advanced ReclaiMe Free RAID Recovery Free, Author: www.reclaime.com, Keywords: Installer, Comments: This installer database contains the logic and data required to install Advanced ReclaiMe Free RAID Recovery Free., Template: Intel;1033, Revision Number: {BAAEC4FF-367D-45A2-B266-709F9930739C}, Create Time/Date: Fri Apr 12 15:52:02 2024, Last Saved Time/Date: Fri Apr 12 15:52:02 2024, Number of Pages: 200, Number of Words: 10, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI3566.tmp
data
dropped
C:\Windows\Installer\SourceHash{58F90A35-6245-4CD8-953C-458660066C65}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF0ACC04FED81BC5A5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF54EAD2A2DE8C7E31.TMP
data
dropped
C:\Windows\Temp\~DF5B6536B42CF01FEB.TMP
data
dropped
C:\Windows\Temp\~DF6F5C6E2DAFBE1548.TMP
data
dropped
C:\Windows\Temp\~DF7A88A451899D604D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF7CE3EAA7D2D8B3BD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF80563B4A6048EC18.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC2D416FF6D026E92.TMP
data
dropped
C:\Windows\Temp\~DFC4865D13A6116123.TMP
data
dropped
C:\Windows\Temp\~DFD5DE597F9BA87F56.TMP
data
dropped
C:\Windows\Temp\~DFDECDA8E549DFF1D6.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFE710D7F65E72009B.TMP
data
dropped
There are 107 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe
"C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe"
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe
"C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe"
malicious
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe
"C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\BackupExtractor.exe"
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\AdvancedReclaiMeFreeRAIDRecoveryFreeSetup.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://curl.se/docs/hsts.html
unknown
http://html4/loose.dtd
unknown
https://curl.se/docs/alt-svc.html#
unknown
http://www.openssl.org/support/faq.htmlRAND
unknown
https://curl.se/docs/http-cookies.html
unknown
http://www.openssl.org/V
unknown
https://curl.se/docs/hsts.html#
unknown
http://www.brynosaurus.com/cachedir/
unknown
https://curl.se/docs/http-cookies.html#
unknown
https://curl.se/docs/alt-svc.html
unknown
http://.css
unknown
http://.jpg
unknown
http://www.openssl.org/support/faq.html
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
65.38.121.69
unknown
United States
8.8.8.8
unknown
United States
146.19.254.194
unknown
France
192.121.22.224
unknown
Sweden

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\4c320b.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\4c320b.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\BBC1D051457178959B0F5B821AF1E8CD
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\95A66911470B00E508B5C0418AB34A16
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\FDF115CBFB604CF5B96D7238F1C25E7C
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\3599258D665BF2C5CBD84142845850E9
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\79B928359A4B4A052BF8F9616FE59BB1
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\B26203E6F6881C25EBA700C2D43F6A42
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\A9D48A3626F2D9450BBD83A4A3340C9E
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\85A8D040C7A26F15DA8CA4741D02877A
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\2C0FAF370352F5359AB4B99CF07776C7
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\5049E05DDB0EF08578B24DA5EB6CBA1C
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\3197933E78A1B6A559CC8982474F6A52
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9C16EBC6A12B21052B55825E7503E6EB
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\D4182110D56702250A39D76B9F13681F
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\3DE42966B34EB8C50A6AF17AC9DC961D
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\35DD68FC59E80195F87934FF6A375790
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\AEADE6F66856841538376590924C3408
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\FF56F6F67CF2D4A5B87FB560A01E1256
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\07399FAFF5AB364548D00E1576F7C4FD
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C9D656E7519573155B79FBC90DAD54C6
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\78FC955D2FACC105F99E47C67DE6B361
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\69D6CBC0DCE3AFC50BF3048EDD63CA66
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8D5084F5AA578185599D6D2D8EA1DB8C
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\9E81BE3649CED6F5193C8DD3BAA9BF08
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\239F274ED52FCAA588C922566320C894
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\437714FE0825E3B5ABDB0DEF3340A8DA
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\EA49954D2AFC538528DF4DF1B5540B1D
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\6F72EA43B035ACB5A8A129DDC279C8B0
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\577B0D750E8DF4C57A412D041966809C
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\B4376C3F908C45B5E9347305403029B1
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8649694AFCF0BE45E8FD75BB3225406C
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\Programs\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\Programs\Advanced ReclaiMe Free RAID Recovery Free\Videos\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\2CD1ECF9EEA86D54ABAEE8A5649D5D25
53A09F8554268DC459C354680660C656
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{58F90A35-6245-4CD8-953C-458660066C65}
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\53A09F8554268DC459C354680660C656
f
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\Features
f
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Products\53A09F8554268DC459C354680660C656\Patches
AllPatches
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
ProductName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
PackageCode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
Assignment
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
AdvertiseFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
InstanceType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
AuthorizedLUAApp
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
DeploymentFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\UpgradeCodes\2CD1ECF9EEA86D54ABAEE8A5649D5D25
53A09F8554268DC459C354680660C656
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656\SourceList
PackageName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656\SourceList\Net
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656\SourceList\Media
1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656
Clients
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\53A09F8554268DC459C354680660C656\SourceList
LastUsedSource
HKEY_CURRENT_USER
ProxyEnable
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BackupExtractor_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BackupExtractor_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BackupExtractor_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BackupExtractor_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BackupExtractor_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BackupExtractor_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\BackupExtractor_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Image AutoEnhancer
There are 106 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
8F62000
heap
page read and write
malicious
8F69000
heap
page read and write
malicious
8F67000
heap
page read and write
malicious
7E84000
heap
page read and write
malicious
8420000
heap
page read and write
malicious
950D000
heap
page read and write
malicious
8F8B000
heap
page read and write
malicious
9AAC000
heap
page read and write
malicious
8F65000
heap
page read and write
malicious
950F000
heap
page read and write
malicious
89DF000
heap
page read and write
malicious
8F61000
heap
page read and write
malicious
9501000
heap
page read and write
malicious
8435000
heap
page read and write
malicious
950D000
heap
page read and write
malicious
9500000
heap
page read and write
malicious
6D47E000
unkown
page read and write
6CCD9000
unkown
page read and write
70F40000
unkown
page readonly
C55000
trusted library allocation
page execute and read and write
7FCD0000
trusted library allocation
page execute and read and write
EAF000
stack
page read and write
6FE0000
trusted library allocation
page read and write
CFE000
stack
page read and write
6F1E000
heap
page read and write
E2E000
stack
page read and write
62E9D000
unkown
page read and write
2EA0000
heap
page read and write
C00000
trusted library allocation
page read and write
62494000
unkown
page readonly
7EC00000
direct allocation
page read and write
7FCF0000
direct allocation
page read and write
7D20000
heap
page read and write
7E5C0000
direct allocation
page read and write
6CC60000
unkown
page readonly
6D6C1000
unkown
page execute read
6ABF000
stack
page read and write
6B3E000
stack
page read and write
6D2D5000
unkown
page readonly
6E930000
unkown
page readonly
6CF39000
unkown
page write copy
2ED0000
heap
page read and write
6D0F6000
unkown
page readonly
6F70000
trusted library allocation
page read and write
7EBE0000
direct allocation
page read and write
2EF0000
heap
page read and write
6CEB3000
unkown
page readonly
F44000
heap
page read and write
6ECB000
heap
page read and write
6D0B0000
unkown
page readonly
F15000
heap
page read and write
2EE4000
heap
page read and write
9DA000
heap
page read and write
2EDB000
heap
page read and write
6CF36000
unkown
page write copy
6D471000
unkown
page execute read
6CCF1000
unkown
page execute read
6CCBE000
unkown
page read and write
68AF000
stack
page read and write
62E80000
unkown
page readonly
DB0000
heap
page read and write
6CCBF000
unkown
page write copy
7EBE0000
direct allocation
page read and write
6E930000
unkown
page readonly
71005000
unkown
page readonly
6D015000
unkown
page readonly
2EE4000
heap
page read and write
7D3C000
heap
page read and write
B11000
unkown
page write copy
6D6C0000
unkown
page readonly
2EA8000
heap
page read and write
6D4C0000
unkown
page readonly
2B50000
heap
page read and write
7FA70000
direct allocation
page read and write
65C000
stack
page read and write
F46000
heap
page read and write
4750000
heap
page execute and read and write
6EE01000
unkown
page execute read
62480000
unkown
page readonly
6D471000
unkown
page execute read
4CC6000
trusted library allocation
page read and write
6E929000
unkown
page read and write
6E926000
unkown
page readonly
6D104000
unkown
page readonly
5901000
trusted library allocation
page read and write
2EF9000
heap
page read and write
6F1E000
heap
page read and write
6D101000
unkown
page read and write
7DAA000
heap
page read and write
2EF9000
heap
page read and write
2E77000
heap
page read and write
2ED0000
heap
page read and write
B40000
heap
page read and write
5E6000
heap
page read and write
6D42C000
unkown
page readonly
6CCD4000
unkown
page readonly
C70000
trusted library allocation
page read and write
2EFD000
heap
page read and write
6D73000
heap
page read and write
693A000
stack
page read and write
2D86000
heap
page read and write
71004000
unkown
page write copy
7170000
trusted library allocation
page read and write
7190000
trusted library allocation
page execute and read and write
6E921000
unkown
page execute read
3080000
heap
page read and write
6EC0000
heap
page read and write
4EC6000
heap
page read and write
2EF0000
heap
page read and write
B13000
unkown
page read and write
2E92000
heap
page read and write
B12000
unkown
page write copy
6D42C000
unkown
page readonly
6D080000
unkown
page readonly
6D52A000
unkown
page readonly
6D4C1000
unkown
page execute read
6D0D0000
unkown
page readonly
62498000
unkown
page write copy
47C2000
trusted library allocation
page read and write
748000
heap
page read and write
6E92A000
unkown
page readonly
6D3D1000
unkown
page execute read
F26000
heap
page read and write
57C4000
trusted library allocation
page read and write
AB0000
unkown
page readonly
6D426000
unkown
page read and write
6E92A000
unkown
page readonly
467E000
stack
page read and write
F17000
heap
page read and write
7D62000
heap
page read and write
6ECA000
heap
page read and write
93D000
stack
page read and write
5789000
trusted library allocation
page read and write
2D60000
heap
page read and write
62481000
unkown
page execute read
9E8000
heap
page read and write
7C6A000
trusted library allocation
page read and write
6ECA000
heap
page read and write
6D09A000
unkown
page readonly
2EB9000
heap
page read and write
3060000
heap
page read and write
2EAF000
heap
page read and write
62480000
unkown
page readonly
2EDB000
heap
page read and write
6EE00000
unkown
page readonly
AFE000
unkown
page readonly
6D28000
heap
page read and write
6CCF0000
unkown
page readonly
7C40000
heap
page read and write
6CCF1000
unkown
page execute read
6CF3A000
unkown
page readonly
7EC00000
direct allocation
page read and write
6CCC0000
unkown
page read and write
7D9F000
heap
page read and write
6E931000
unkown
page execute read
F99000
heap
page read and write
6D3D1000
unkown
page execute read
2EF9000
heap
page read and write
6CCF0000
unkown
page readonly
68ED000
stack
page read and write
6D429000
unkown
page read and write
70F41000
unkown
page execute read
6D461000
unkown
page read and write
6EE00000
unkown
page readonly
6D3D0000
unkown
page readonly
6D416000
unkown
page readonly
7D34000
heap
page read and write
2EF0000
heap
page read and write
6FD0000
trusted library allocation
page read and write
6EEC000
heap
page read and write
2E97000
heap
page read and write
6EE5F000
unkown
page readonly
6D416000
unkown
page readonly
6D42000
heap
page read and write
6CC61000
unkown
page execute read
6D441000
unkown
page execute read
7FC40000
direct allocation
page read and write
6F0B000
heap
page read and write
6CF15000
unkown
page readonly
62D000
stack
page read and write
D00000
heap
page readonly
6D0A1000
unkown
page readonly
67ED000
stack
page read and write
2EA0000
heap
page read and write
6EE5D000
unkown
page read and write
6D068000
unkown
page write copy
7103D000
unkown
page read and write
6F32000
heap
page read and write
6D44D000
unkown
page readonly
7D0000
heap
page read and write
AB1000
unkown
page execute read
B11000
unkown
page read and write
6D014000
unkown
page read and write
62E81000
unkown
page execute read
6CA9000
heap
page read and write
2EAF000
heap
page read and write
2EDB000
heap
page read and write
6D063000
unkown
page write copy
6D6EC000
unkown
page readonly
498000
stack
page read and write
6D060000
unkown
page readonly
DD0000
trusted library allocation
page read and write
791000
heap
page read and write
6CEB2000
unkown
page read and write
AB1000
unkown
page execute read
6EE08000
unkown
page read and write
2EA6000
heap
page read and write
6F4D000
stack
page read and write
6D0B0000
unkown
page readonly
2D6C000
heap
page read and write
6D34F000
unkown
page readonly
6F0B000
heap
page read and write
6EDC000
heap
page read and write
AFE000
unkown
page readonly
6EE01000
unkown
page execute read
686E000
stack
page read and write
5A471000
direct allocation
page read and write
6F1E000
heap
page read and write
6D0A1000
unkown
page readonly
6D068000
unkown
page write copy
50D0000
trusted library allocation
page read and write
2EE4000
heap
page read and write
F8D000
heap
page read and write
83C000
stack
page read and write
6E926000
unkown
page readonly
6CF9000
heap
page read and write
6D470000
unkown
page readonly
2EB9000
heap
page read and write
50CE000
trusted library allocation
page read and write
6D426000
unkown
page read and write
7FCE000
stack
page read and write
4A49000
trusted library allocation
page read and write
6F0000
heap
page read and write
10A0000
heap
page read and write
6EDB000
heap
page read and write
2E84000
heap
page read and write
6CDC000
heap
page read and write
4E18000
trusted library allocation
page read and write
7F289000
direct allocation
page read and write
6EE06000
unkown
page readonly
6D527000
unkown
page readonly
6CCD9000
unkown
page read and write
F8D000
heap
page read and write
6D427000
unkown
page write copy
279D000
stack
page read and write
6E920000
unkown
page readonly
6D0BC000
unkown
page readonly
6F0B000
heap
page read and write
FAE000
stack
page read and write
6EE1000
heap
page read and write
6F50000
trusted library allocation
page read and write
AB0000
unkown
page readonly
4D2B000
trusted library allocation
page read and write
F99000
heap
page read and write
2EF9000
heap
page read and write
6D0B1000
unkown
page execute read
F12000
heap
page read and write
6F90000
trusted library allocation
page read and write
B11000
unkown
page write copy
C20000
trusted library allocation
page read and write
AB1000
unkown
page execute read
7080000
heap
page read and write
7EBB0000
direct allocation
page read and write
6EE41000
unkown
page execute read
7E860000
direct allocation
page read and write
6D104000
unkown
page readonly
980000
heap
page read and write
6F0E000
stack
page read and write
6CCDF000
unkown
page write copy
7EB70000
direct allocation
page read and write
B12000
unkown
page write copy
6E940000
unkown
page readonly
6D464000
unkown
page readonly
7E9E0000
direct allocation
page read and write
6248F000
unkown
page readonly
62EA1000
unkown
page readonly
62481000
unkown
page execute read
2AFD000
stack
page read and write
6CC60000
unkown
page readonly
6D111000
unkown
page execute read
7CA0000
trusted library allocation
page read and write
7F870000
direct allocation
page read and write
6D0C1000
unkown
page readonly
7F8B0000
direct allocation
page read and write
F34000
heap
page read and write
7EA80000
direct allocation
page read and write
473E000
stack
page read and write
6FC0000
trusted library allocation
page read and write
C40000
heap
page read and write
2EE4000
heap
page read and write
6E0E000
stack
page read and write
6EC0000
heap
page read and write
6D07000
heap
page read and write
6CF36000
unkown
page write copy
6C90000
heap
page read and write
6E929000
unkown
page read and write
6D34A000
unkown
page read and write
6D1F000
heap
page read and write
697D000
stack
page read and write
6D069000
unkown
page readonly
6F32000
heap
page read and write
6CCE0000
unkown
page readonly
7DA5000
heap
page read and write
6D0B1000
unkown
page execute read
2EC8000
heap
page read and write
2EC0000
heap
page read and write
6E931000
unkown
page execute read
6F0B000
heap
page read and write
9B0000
heap
page read and write
2E8F000
heap
page read and write
7B8D000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
F45000
heap
page read and write
6D0BC000
unkown
page readonly
6FB0000
trusted library allocation
page read and write
62495000
unkown
page read and write
6F32000
heap
page read and write
2CAE000
stack
page read and write
6D440000
unkown
page readonly
6EB9000
heap
page read and write
6CCDA000
unkown
page write copy
6CCE0000
unkown
page readonly
6D429000
unkown
page read and write
62495000
unkown
page read and write
71030000
unkown
page readonly
6FA0000
trusted library allocation
page read and write
6D069000
unkown
page readonly
718000
heap
page read and write
68F0000
heap
page execute and read and write
6CEB3000
unkown
page readonly
6D0C0000
unkown
page read and write
6EB8000
heap
page read and write
7EA60000
direct allocation
page read and write
6E93F000
unkown
page read and write
6D081000
unkown
page execute read
6D524000
unkown
page read and write
C52000
trusted library allocation
page read and write
2EBD000
heap
page read and write
6CEB2000
unkown
page read and write
71030000
unkown
page readonly
6C60000
trusted library allocation
page read and write
2EDB000
heap
page read and write
8140000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
6DCE000
stack
page read and write
7D9D000
heap
page read and write
2EDC000
heap
page read and write
62E81000
unkown
page execute read
AB1000
unkown
page execute read
62499000
unkown
page readonly
702D000
stack
page read and write
75D000
stack
page read and write
C50000
trusted library allocation
page read and write
B14000
unkown
page readonly
6F32000
heap
page read and write
6D524000
unkown
page read and write
6D4C1000
unkown
page execute read
2EE4000
heap
page read and write
45C000
stack
page read and write
46FE000
stack
page read and write
6D44D000
unkown
page readonly
2EBC000
heap
page read and write
6249B000
unkown
page readonly
6D39000
heap
page read and write
71040000
unkown
page readonly
8150000
trusted library allocation
page read and write
62EA1000
unkown
page readonly
2F5F000
unkown
page read and write
D60000
heap
page read and write
6D0D0000
unkown
page readonly
6D0C0000
unkown
page read and write
7103D000
unkown
page read and write
7C60000
trusted library allocation
page read and write
6D6FB000
unkown
page read and write
AB0000
unkown
page readonly
6CF51000
unkown
page execute read
6D0D1000
unkown
page execute read
6E40000
heap
page execute and read and write
6D080000
unkown
page readonly
AFE000
unkown
page readonly
6D51000
heap
page read and write
6E30000
trusted library allocation
page read and write
2D10000
heap
page read and write
2ED0000
heap
page read and write
62494000
unkown
page readonly
6D0D1000
unkown
page execute read
6D101000
unkown
page read and write
6EE09000
unkown
page readonly
7E8C000
heap
page read and write
7F22000
trusted library allocation
page read and write
6D427000
unkown
page write copy
6F33000
heap
page read and write
6F12000
heap
page read and write
7C67000
trusted library allocation
page read and write
6D061000
unkown
page read and write
62E9D000
unkown
page read and write
6AE000
stack
page read and write
6CD6000
heap
page read and write
7F9B0000
direct allocation
page read and write
6F12000
heap
page read and write
6EE08000
unkown
page read and write
EE7000
heap
page read and write
B11000
unkown
page write copy
6D6FD000
unkown
page readonly
2EC8000
heap
page read and write
6F1E000
heap
page read and write
70F41000
unkown
page execute read
F35000
heap
page read and write
6CF50000
unkown
page readonly
6248F000
unkown
page readonly
6CCDF000
unkown
page write copy
2EF0000
heap
page read and write
2E92000
heap
page read and write
D10000
trusted library allocation
page read and write
706B000
stack
page read and write
6CCC1000
unkown
page readonly
71040000
unkown
page readonly
6EE1000
heap
page read and write
5910000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
6CCBE000
unkown
page read and write
6CCC1000
unkown
page readonly
305F000
stack
page read and write
6EE56000
unkown
page readonly
B14000
unkown
page readonly
7F0000
heap
page read and write
6CF35000
unkown
page read and write
7C0000
heap
page read and write
C47000
heap
page read and write
6D441000
unkown
page execute read
B14000
unkown
page readonly
F44000
heap
page read and write
6D470000
unkown
page readonly
D6C000
stack
page read and write
710000
heap
page read and write
2EC8000
heap
page read and write
2EA6000
heap
page read and write
9B7000
heap
page read and write
5E0000
heap
page read and write
6EE06000
unkown
page readonly
C10000
trusted library allocation
page read and write
2EBF000
heap
page read and write
2B90000
heap
page read and write
6F32000
heap
page read and write
6D3D0000
unkown
page readonly
6D34F000
unkown
page readonly
7C70000
trusted library allocation
page read and write
9B0000
heap
page read and write
EDF000
heap
page read and write
6A7E000
stack
page read and write
D18000
trusted library allocation
page read and write
6CCC0000
unkown
page read and write
62499000
unkown
page readonly
6EE8000
heap
page read and write
6EDB000
heap
page read and write
62EA0000
unkown
page write copy
66D000
stack
page read and write
6D6C1000
unkown
page execute read
7170000
trusted library allocation
page read and write
62E95000
unkown
page readonly
6E8E000
stack
page read and write
6F12000
heap
page read and write
7EC30000
direct allocation
page read and write
62E9C000
unkown
page readonly
2EF0000
heap
page read and write
6E940000
unkown
page readonly
7C3E000
stack
page read and write
AB0000
unkown
page readonly
7E940000
direct allocation
page read and write
8F64000
heap
page read and write
6D013000
unkown
page write copy
79C000
heap
page read and write
2B00000
heap
page read and write
6D09A000
unkown
page readonly
C3F000
stack
page read and write
6D4D000
heap
page read and write
6F1E000
heap
page read and write
6D47B000
unkown
page readonly
7E8C000
heap
page read and write
73C000
heap
page read and write
62E9C000
unkown
page readonly
7F260000
direct allocation
page read and write
B14000
unkown
page readonly
F06000
heap
page read and write
6E93F000
unkown
page read and write
6D47F000
unkown
page readonly
DCD000
stack
page read and write
6D34A000
unkown
page read and write
7F940000
direct allocation
page read and write
6EE09000
unkown
page readonly
F26000
heap
page read and write
58430000
direct allocation
page read and write
2EBB000
heap
page read and write
4ECD000
heap
page read and write
7B90000
trusted library allocation
page read and write
F46000
heap
page read and write
788000
heap
page read and write
6CF50000
unkown
page readonly
2EF9000
heap
page read and write
6D2D5000
unkown
page readonly
6D464000
unkown
page readonly
6D3F000
heap
page read and write
6D063000
unkown
page write copy
F06000
heap
page read and write
7E880000
direct allocation
page read and write
F9D000
heap
page read and write
F45000
heap
page read and write
990000
heap
page read and write
7EB70000
direct allocation
page read and write
6CF3A000
unkown
page readonly
6D0F6000
unkown
page readonly
2EDB000
heap
page read and write
6EEC000
heap
page read and write
6F32000
heap
page read and write
6EDB000
heap
page read and write
C1D000
trusted library allocation
page execute and read and write
6EE40000
unkown
page readonly
AB0000
unkown
page readonly
D5E000
stack
page read and write
AFE000
unkown
page readonly
6CF15000
unkown
page readonly
6D47E000
unkown
page read and write
62498000
unkown
page write copy
6F12000
heap
page read and write
6D6C0000
unkown
page readonly
71004000
unkown
page write copy
1010000
heap
page read and write
7B70000
heap
page read and write
4E80000
trusted library allocation
page read and write
6D110000
unkown
page readonly
F99000
heap
page read and write
6F1E000
heap
page read and write
6D440000
unkown
page readonly
6CCD4000
unkown
page readonly
B11000
unkown
page read and write
2EE4000
heap
page read and write
6B72000
heap
page read and write
6D110000
unkown
page readonly
7D10000
heap
page read and write
6D6FD000
unkown
page readonly
AFE000
unkown
page readonly
F8D000
heap
page read and write
7DE50000
direct allocation
page read and write
7FE1000
trusted library allocation
page read and write
C29000
trusted library allocation
page read and write
7BFD000
stack
page read and write
6D0C1000
unkown
page readonly
6E920000
unkown
page readonly
4761000
trusted library allocation
page read and write
7FCC0000
direct allocation
page read and write
6D081000
unkown
page execute read
2EF9000
heap
page read and write
6EE8000
heap
page read and write
7F8E000
stack
page read and write
2700000
heap
page read and write
7070000
heap
page read and write
AB1000
unkown
page execute read
F9B000
heap
page read and write
7B80000
trusted library allocation
page read and write
6D527000
unkown
page readonly
4F45000
trusted library allocation
page read and write
90E000
stack
page read and write
EF7000
heap
page read and write
7FCF8000
direct allocation
page read and write
2EF0000
heap
page read and write
6D47F000
unkown
page readonly
46BE000
stack
page read and write
2EAF000
heap
page read and write
F37000
heap
page read and write
70F40000
unkown
page readonly
7180000
trusted library allocation
page read and write
6ECE000
stack
page read and write
2EE4000
heap
page read and write
6EEC000
heap
page read and write
6D060000
unkown
page readonly
6D47B000
unkown
page readonly
DAE000
stack
page read and write
998000
heap
page read and write
6E921000
unkown
page execute read
6CCDA000
unkown
page write copy
6F12000
heap
page read and write
69BB000
stack
page read and write
7C50000
trusted library allocation
page execute and read and write
F46000
heap
page read and write
6D014000
unkown
page read and write
6CF39000
unkown
page write copy
682B000
stack
page read and write
2EC8000
heap
page read and write
B14000
unkown
page readonly
6D52A000
unkown
page readonly
B13000
unkown
page read and write
7FCE8000
trusted library allocation
page execute and read and write
6D09F000
unkown
page read and write
7EA80000
direct allocation
page read and write
F8D000
heap
page read and write
6F80000
trusted library allocation
page read and write
6D013000
unkown
page write copy
F46000
heap
page read and write
6249B000
unkown
page readonly
6D111000
unkown
page execute read
7D2C000
heap
page read and write
62EA0000
unkown
page write copy
2E74000
heap
page read and write
6D6EC000
unkown
page readonly
6CF35000
unkown
page read and write
2ED3000
heap
page read and write
48B6000
trusted library allocation
page read and write
CBE000
stack
page read and write
6EE1000
heap
page read and write
6EEC000
heap
page read and write
6CCBF000
unkown
page write copy
294F000
stack
page read and write
6CC61000
unkown
page execute read
6D461000
unkown
page read and write
2EF0000
heap
page read and write
6D015000
unkown
page readonly
7E9E0000
direct allocation
page read and write
68F5000
heap
page execute and read and write
9E0000
heap
page read and write
4EC5000
trusted library allocation
page read and write
C5E000
stack
page read and write
D70000
trusted library allocation
page execute and read and write
6EE8000
heap
page read and write
6D6FB000
unkown
page read and write
ED5000
heap
page read and write
463E000
stack
page read and write
6AFE000
stack
page read and write
6F12000
heap
page read and write
6D09F000
unkown
page read and write
2B4E000
unkown
page read and write
6D19000
heap
page read and write
2ED0000
heap
page read and write
7F40000
trusted library allocation
page execute and read and write
2EDB000
heap
page read and write
62E80000
unkown
page readonly
C14000
trusted library allocation
page read and write
500000
heap
page read and write
2D82000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
7FD0000
trusted library allocation
page read and write
6D4C0000
unkown
page readonly
D80000
heap
page read and write
62E95000
unkown
page readonly
2EB9000
heap
page read and write
6D061000
unkown
page read and write
F06000
heap
page read and write
2ED0000
heap
page read and write
C13000
trusted library allocation
page execute and read and write
71005000
unkown
page readonly
2EF9000
heap
page read and write
6EE000
stack
page read and write
6CF51000
unkown
page execute read
58F0000
trusted library allocation
page read and write
7D38000
heap
page read and write
6E10000
trusted library allocation
page read and write
2EC8000
heap
page read and write
There are 646 hidden memdumps, click here to show them.